I had just the same issue a few months ago...
I ended up starting coding a platform running on a linux "appliance".
The files I upload in this appliance are crypted, splitted and stored on an array of cloud drives... the map to reconstruct the files being stored in a db or in a script. This method also allows deduplication of data... working a bit like raid.
In this way, not only do cloud services not access to the metadata, but if one host gets "problems" (ie megaupload), then I still have some copies of all parts somewhere else.

For a nice workstation, you might consider changing motherboard and CPU,
To get it last like a tablet... turn the screen and wifi off (like a tablet)
For saving electricity, you might consider a raspberry pi.

blackest_k writes: I've been playing around with html5 and javascript and put up a couple of pages on my webhost while using chrome on osx i had a strange tab open saying chrome was out of date and offering to let me download an updated version "setup.exe"
the page was on an info site.
So i asked myself why did that open? and I made a curious discovery.
when i viewed my page source it was as i wrote it. A simple page to play a mp4 video with html5.
however when i chose to download the page as webpage complete i found an extra js file app.js also the page header had this line added.

script type="text/javascript" src="./End Credits-b_files/app.js">script type="text/javascript" src="http://www.youradexchange.com/ad/display.php?r=32796">/script>/head>
So that had removed part of the problem but not the part that was trying to get me to download (presumably malware).
I tried the same exercise in linux and got the same result in google chrome.
however in firefox my page was as I had written it. there was no app.js in the complete webpage or on my server.
Anyway this seems to be an issue from google chrome or an extension.
Has anyone any light to shine on this issue?
I wouldn't normally post an ask slashdot but as this appears to be modifying normal web pages i'm quite concerned.

alphadogg writes: Cisco has joined the Open Compute Project, a Facebook-driven effort to develop open source servers and switches, 16 months after criticizing it. At that time, Cisco CEO John Chambers said OCP has “weaknesses” that Cisco can exploit. Chambers said efforts like Facebook’s to commoditize and wring cost out of hardware purchases will open up opportunities for Cisco to provide solutions that are better tailored to specific customer needs.Link to Original Source

An anonymous reader writes: Over the past couple of years, Google has implemented some changes to how Android handles SD cards that aren't very beneficial to users or developers. After listening to many rounds of complaints, this seems to have changed in Android 5.0 Lollipop. Google's Jeff Sharkey wrote, "[I]n Lollipop we added the new ACTION_OPEN_DOCUMENT_TREE intent. Apps can launch this intent to pick and return a directory from any supported DocumentProvider, including any of the shared storage supported by the device. Apps can then create, update, and delete files and directories anywhere under the picked tree without any additional user interaction. Just like the other document intents, apps can persist this access across reboots." Android Police adds, "All put together, this should be enough to alleviate most of the stress related to SD cards after the release of KitKat. Power users will no longer have to deal with crippled file managers, media apps will have convenient access to everything they should regardless of storage location, and developers won't have to rely on messy hacks to work around the restrictions."Link to Original Source

jupiter126 writes: Born on the 14th of September at CERN, CBI NTNU is an awesome group of students dedicated to solve the problems that no one else can manage. We are a collaboration of students from several disiplines at NTNU, which gives us the advantages that is needed to succeed. We aim to push on forward and bridge the gap between science and society. We will give you the solutions of tomorrow, today. No matter how hard the task is, no matter how tired we are, one thing is for certain......we will succeed! Please check the webpage!

Dear slashdotters, we need your help, as enough likes of the page will unlock university grants for our projects! — thanks for slahsdotting our page;pLink to Original Source

MojoKid writes: When NSA whistleblower Edward Snowden came forth last year with US government spying secrets, it didn't take long to realize that some of the information revealed could bring on serious repercussions — not just for the US government, but also for US-based companies. The latest to feel the hit? None other than Apple, and in a region the company has been working hard to increase market share: China. China, via state media, has today declared that Apple's iPhone is a threat to national security — all because of its thorough tracking capabilities. It has the ability to keep track of user locations, and to the country, this could potentially reveal "state secrets" somehow. It's being noted that the iPhone will continue to track the user to some extent even if the overall feature is disabled. China's iPhone ousting comes hot on the heels of Russia's industry and trade deeming AMD and Intel processors to be untrustworthy. The nation will instead be building its own ARM-based "Baikal" processor.Link to Original Source

With net neutrality, piracy and privacy issues... we should indeed expect a "new" internet by 2020.

IPv6 will be the rule of law of course, for one base reason:
IPV4 can not support the growth in emerging markets

and two (interconnected) reasons
- it allows more consumers to connect with more devices
- it allows better tracking - which is a crucial pillar of today's internet sponsorship

Finally, it is the only "partially working" solution today, commercial routers support it, and there is no other protocol that meet today's need and is implemented in most vendors next gen solutions: it has already been tested and accepted by the network's core infrastructure suppliers.

Of course, some custom industrial solutions might need more time to be replaced, but "on the shelf" solutions will be IPV6 before 2020!

SO YES... IPv6 will be mostly integrated (for consumers) before 2020...
In corporations, IPV4 will remain a compatibility issue for a long time, in a similar way that system admins still have to deal with coax cables and VAX or SPARC systems today.

Schranz writes: Columbia University PhD students managed to run iOS apps natively on Android:http://systems.cs.columbia.edu...They built a compatibility layer (iOS-"kernel" XNU is open source) on top of Androids kernel that lets you run unmodified (no legal issues) iOS libraries and therefore iOS apps.Apps have only little overhead, it's pretty efficient.Paper was released in march '14 and it didn't get the attention it deserves.

While all these threads apply to today's public standards, it is still very possible for a motivated person to send strongly coded messages on internet, there are three simple rules to respect:
- Use a secured host which is not connected to any network (try openbsd for example)
- Use many encryption layers, and one passworded key (like I did in https://github.com/jupiter126/... )
- Send the pass and archives by secure ways... (ex: the pass on paper, and the key split in 128 different messages)

Encryption is not dead... it is the future, but it is one step behind decryption at this very moment.

Net neutrality can be approached with two purposes:
- Be neutral about what is allowed on internet (Block specific content)
- Be neutral about who is allowed on internet (Block specific sites)
Content distributors are interested in blocking specific content (MCAA, RIAA,...), infrastructure providers are interested in blocking specific sites (netflix,...): it is a battle for money.

Human nature dictates us to be creative to reach our objectives.
These laws will thus only accelerate the birth and growth of new networks, which their creators might surprisingly base on the shortcomings of what they miss in the existing one.
As users will be motivated to search for alternatives, demand will be raising, and while TOR is only a "first generation" secure network and its use remains marginal, these laws will help these kind of networks to go mainstream.
They will then try to block these networks, triggering further evolution, back to the chicken and the egg.

On the meantime, illegal organisations will benefit from those new mainstream technologies, and our dear agencies might need to gear up a bit ^^
Now for the funding: Taxes.

And this is how you lost the war for money, even if you did not buy their content or bypass their architecture \o/